Hilton et al., 2022 - Google Patents
Beware of ips in sheep's clothing: Measurement and disclosure of ip spoofing vulnerabilitiesHilton et al., 2022
View PDF- Document ID
- 13419278370548909864
- Author
- Hilton A
- Hirschmann J
- Deccio C
- Publication year
- Publication venue
- IEEE/ACM Transactions on Networking
External Links
Snippet
Networks not employing destination-side source address validation (DSAV) expose themselves to a class of pernicious attacks which could be prevented by filtering inbound traffic purporting to originate from within the network. In this work, we survey the …
- 238000005259 measurement 0 title abstract description 36
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | You've got vulnerability: Exploring effective vulnerability notifications | |
Dagon et al. | Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. | |
US8869237B2 (en) | Method and system for propagating network policy | |
Vissers et al. | The wolf of name street: Hijacking domains through their nameservers | |
USRE50068E1 (en) | Method and system for propagating network policy | |
Alowaisheq et al. | Zombie awakening: Stealthy hijacking of active domains through DNS hosting referral | |
Deccio et al. | Behind closed doors: a network tale of spoofing, intrusion, and false DNS security | |
Bou-Harb et al. | Multidimensional investigation of source port 0 probing | |
Dissanayake | DNS cache poisoning: A review on its technique and countermeasures | |
Schwittmann et al. | Domain impersonation is feasible: A study of ca domain validation vulnerabilities | |
Hilton et al. | Beware of ips in sheep’s clothing: Measurement and disclosure of ip spoofing vulnerabilities | |
Schlamp et al. | A forensic case study on as hijacking: the attacker's perspective | |
Hudaib et al. | DNS advanced attacks and analysis | |
Noborio et al. | A feasible motion-planning algorithm for a mobile robot based on a quadtree representation | |
Li et al. | The maginot line: Attacking the boundary of {DNS} caching protection | |
Shulman et al. | Towards forensic analysis of attacks with DNSSEC | |
Akiwate et al. | Retroactive identification of targeted DNS infrastructure hijacking | |
Nosyk et al. | Unveiling the weak links: exploring DNS infrastructure vulnerabilities and fortifying defenses | |
Schechter et al. | Inoculating SSH Against Address Harvesting. | |
Bator et al. | Security of the DNSSEC protocol and its impact on online privacy protection | |
AT&T | Microsoft Word - karasaridis_DNS_Security_E1.0_20120425 | |
Aucklah et al. | The impact of internet of things on the domain name system | |
Reed et al. | Potential Email Compromise via Dangling DNS MX | |
Chowdhury et al. | eyedns: Monitoring a university campus network | |
Nosyk et al. | Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet |